ID

VAR-201907-1336


CVE

CVE-2019-11890


TITLE

Sony Bravia Smart TV Vulnerabilities related to resource management in devices

Trust: 0.8

sources: JVNDB: JVNDB-2019-006258

DESCRIPTION

Sony Bravia Smart TV devices allow remote attackers to cause a denial of service (device hang or reboot) via a SYN flood attack over a wired or Wi-Fi LAN. Sony Bravia Smart TV The device contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Sony BRAVIA SmartTVs is a smart TV from Sony Corporation of Japan. There are security holes in SonyBRAVIASmartTVs. An attacker could exploit the vulnerability to cause a video card screen that could not respond, crashed the program, and caused the TV to reboot. ## ADVISORY INFORMATION TITLE: Two vulnerabilities found in Sony BRAVIA Smart TVs ADVISORY URL: CVE-2019-11889 https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-triggered-over-vulnerability-hbbtv-xl-19-014/ CVE-2019-11890 https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-over-wifi-lan-internet-vulnerability-xl-19-013/ DATE PUBLISHED: 02/07/2019 AFFECTED VENDORS: Sony RELEASE MODE: Coordinated release CVE: CVE-2019-11889, CVE-2019-11890 CVSSv3 for CVE-2019-11889: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) CVSSv3 for CVE-2019-11890: 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) ## PRODUCT DESCRIPTION BRAVIA is a brand of Sony Visual Products known as Smart TVs. These Smart TVs are known to be high standard products. ## DETAILS OF VULNERABILITIES xen1thLabs has found two vulnerabilities in Sony products and coordinated the disclosure of these security flaws with Sony. The list of affected models has not been shared by Sony. The summary of the vulnerabilities is: - CVE-2019-11889 Sony Remote Denial-of-Service Triggered Over HbbTV Vulnerability: This vulnerability allows an attacker to remotely crash the HbbTV rendering engine and block the TV - CVE-2019-11890 Sony Remote Denial-of-Service Over Wifi / LAN / Internet Vulnerability: This vulnerability allows an attacker to remotely crash the Smart TV using TCP packets. ### 1. CVE-2019-11889 Sony Remote Denial-of-Service Triggered Over HbbTV Vulnerability By sending a specifically crafted webpage over HbbTV it is possible to freeze the television remotely. (please see the presentation at HiTB Dubai 2018 for HbbTV description https://conference.hitb.org/hitbsecconf2018dxb/sessions/hacking-into-broadband-and-broadcast-tv-systems/), The remote control does not appear to work except the PROG+ and PROG- buttons. Only changing channels allows to 'un-freeze' the television. Android is supposed to kill blocked applications. In order to reproduce the behavior, start by generating a webpage using: ``` dd if=/dev/zero of=index.html bs=1M count=2048 ```` Using the software-defined radio, send a DVB-T signal containing a HbbTV application that force the targeted Smart TV to load a file from a controlled server. By forcing the Smart TV to load the generated file, it can be observed from the logs, only between 180KB and 250KB are served before the HbbTV application freezes: ``` vaccess.log:127.0.1.1:80 192.168.1.191 - - [01/Apr/2019:06:40:54 -0400] "GET /hbbtvtest/test3/ HTTP/1.1" 200 178647 "http://x.test/hbbtvtest/index.php" "Mozilla/5.0 (Linux armv7l) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36 OPR/29.0.1803.0 OMI/4.5.23.37.ALSAN5.131 HbbTV/1.2.1 (; Sony; KD-65X7500D; v1.000000000; 2016;) sony.hbbtv.tv.2016HE" ```` ``` vaccess.log.1:127.0.1.1:80 192.168.1.191 - - [01/Apr/2019:02:36:16 -0400] "GET /hbbtvtest/test3/ HTTP/1.1" 200 170543 "http://x.test/hbbtvtest/index.php" "Mozilla/5.0 (Linux armv7l) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.152 Safari/537.36 OPR/29.0.1803.0 OMI/4.5.23.37.ALSAN5.131 HbbTV/1.2.1 (; Sony; KD-65X7500D; v1.000000000; 2016;) sony.hbbtv.tv.2016HE" ```` Sony investigated the issue and shared the following analysis: "MITM attack by http connection is caused by the specification of the HbbTV service". ### 2. No PoC is released due to low complexity level of exploitation as Sony is not planning to release a security patch. Sony investigated the issue and shared the following analysis: "The Sony Product teams have conducted additional research regarding the submission and identified the following: CVE-2019-1189: DoS over WiFi /LAN - This is due to the performance of the interrupt operation in the Linux driver". ## SOLUTION Sony provided the following recommendation: "Sony's manual instructs users to: Make sure to connect to the Internet or home network via a router, which will minimize this risk. In addition, these two symptoms can be recovered by unplugging the power supply cable. The TV cannot be broken and there is no internal data that can be stolen by these actions." (May 30th, 2019). And informed xen1thLabs that: "we will not be releasing any notifications." (June 19th, 2019). ## DISCLOSURE TIMELINE 01/04/2019 - Vulnerabilities have been found by xen1thLabs 28/04/2019 - xen1thLabs send the report to Sony through their HackerOne Bug bounty program 02/05/2019 - Updates requested from xen1thLabs through HackerOne 10/05/2019 - Vulnerabilities have been confirmed by Sony through HackerOne 14/05/2019 - xen1thLabs requests a CVE from MITRE 30/05/2019 - Sony inform xen1thLabs of the solutions recommended for users through HackerOne 30/05/2019 - xen1thLabs request the confirmation from Sony that no security patches will be provided through HackerOne 07/06/2019 - Sony informs the following "Due to the evaluation conducted by our product team we will be closing out this ticket" through HackerOne 26/06/2019 - Public disclosure ## CREDITS xen1thLabs - Telecom Lab ## REFERENCES CVE-2019-11889 https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-triggered-over-vulnerability-hbbtv-xl-19-014/ CVE-2019-11890 https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-over-wifi-lan-internet-vulnerability-xl-19-013/ Sony will not publish any security advisory nor release any security patch. ## ABOUT xen1thLabs xen1thLabs conducts vulnerability research, which feeds in the testing and validation activities it conducts across software, hardware and telecommunication. xen1thLabs houses a team of world-class experts dedicated to providing high impact capabilities in cyber security. At xen1thLabs we are committed to uncovering new vulnerabilities that combat tomorrow's threats today. More information about xen1thLabs can be found at: https://www.darkmatter.ae/xen1thlabs/ ## WORKING AT xen1thLabs xen1thLabs is looking for several security researchers across multiple disciplines. Join a great team of likeminded specialists and enjoy all that UAE has to offer! If you are interested please visit: https://www.darkmatter.ae/xen1thlabs/

Trust: 2.43

sources: NVD: CVE-2019-11890 // JVNDB: JVNDB-2019-006258 // CNVD: CNVD-2019-23992 // VULHUB: VHN-143582 // VULMON: CVE-2019-11890 // PACKETSTORM: 153547

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-23992

AFFECTED PRODUCTS

vendor:sonymodel:braviascope:eqversion: -

Trust: 1.0

vendor:sonymodel:braviascope: - version: -

Trust: 0.8

vendor:sonymodel:bravia smart tvsscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2019-23992 // JVNDB: JVNDB-2019-006258 // NVD: CVE-2019-11890

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11890
value: HIGH

Trust: 1.0

NVD: CVE-2019-11890
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-23992
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201907-374
value: HIGH

Trust: 0.6

VULHUB: VHN-143582
value: HIGH

Trust: 0.1

VULMON: CVE-2019-11890
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-11890
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-23992
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-143582
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11890
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-23992 // VULHUB: VHN-143582 // VULMON: CVE-2019-11890 // JVNDB: JVNDB-2019-006258 // CNNVD: CNNVD-201907-374 // NVD: CVE-2019-11890

PROBLEMTYPE DATA

problemtype:CWE-400

Trust: 1.1

problemtype:CWE-399

Trust: 0.9

sources: VULHUB: VHN-143582 // JVNDB: JVNDB-2019-006258 // NVD: CVE-2019-11890

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201907-374

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201907-374

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-006258

PATCH

title:BRAVIAurl:https://www.sony.jp/bravia/

Trust: 0.8

sources: JVNDB: JVNDB-2019-006258

EXTERNAL IDS

db:NVDid:CVE-2019-11890

Trust: 3.3

db:PACKETSTORMid:153547

Trust: 2.5

db:JVNDBid:JVNDB-2019-006258

Trust: 0.8

db:CNNVDid:CNNVD-201907-374

Trust: 0.7

db:CNVDid:CNVD-2019-23992

Trust: 0.6

db:VULHUBid:VHN-143582

Trust: 0.1

db:VULMONid:CVE-2019-11890

Trust: 0.1

sources: CNVD: CNVD-2019-23992 // VULHUB: VHN-143582 // VULMON: CVE-2019-11890 // JVNDB: JVNDB-2019-006258 // PACKETSTORM: 153547 // CNNVD: CNNVD-201907-374 // NVD: CVE-2019-11890

REFERENCES

url:http://packetstormsecurity.com/files/153547/sony-bravia-smart-tv-denial-of-service.html

Trust: 3.0

url:https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-over-wifi-lan-internet-vulnerability-xl-19-013/

Trust: 2.7

url:http://seclists.org/fulldisclosure/2019/jul/8

Trust: 1.9

url:https://www.first.org/members/teams/sony_psirt

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11890

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11890

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11889

Trust: 0.1

url:https://www.darkmatter.ae/xen1thlabs/sony-remote-denial-of-service-triggered-over-vulnerability-hbbtv-xl-19-014/

Trust: 0.1

url:http://x.test/hbbtvtest/index.php"

Trust: 0.1

url:https://www.darkmatter.ae/xen1thlabs/

Trust: 0.1

url:https://conference.hitb.org/hitbsecconf2018dxb/sessions/hacking-into-broadband-and-broadcast-tv-systems/),

Trust: 0.1

sources: CNVD: CNVD-2019-23992 // VULHUB: VHN-143582 // VULMON: CVE-2019-11890 // JVNDB: JVNDB-2019-006258 // PACKETSTORM: 153547 // CNNVD: CNNVD-201907-374 // NVD: CVE-2019-11890

CREDITS

xen1thLabs

Trust: 0.7

sources: PACKETSTORM: 153547 // CNNVD: CNNVD-201907-374

SOURCES

db:CNVDid:CNVD-2019-23992
db:VULHUBid:VHN-143582
db:VULMONid:CVE-2019-11890
db:JVNDBid:JVNDB-2019-006258
db:PACKETSTORMid:153547
db:CNNVDid:CNNVD-201907-374
db:NVDid:CVE-2019-11890

LAST UPDATE DATE

2024-11-23T22:33:49.168000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-23992date:2019-07-23T00:00:00
db:VULHUBid:VHN-143582date:2020-08-24T00:00:00
db:VULMONid:CVE-2019-11890date:2020-08-24T00:00:00
db:JVNDBid:JVNDB-2019-006258date:2019-07-17T00:00:00
db:CNNVDid:CNNVD-201907-374date:2020-08-25T00:00:00
db:NVDid:CVE-2019-11890date:2024-11-21T04:21:58.010

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-23992date:2019-07-23T00:00:00
db:VULHUBid:VHN-143582date:2019-07-09T00:00:00
db:VULMONid:CVE-2019-11890date:2019-07-09T00:00:00
db:JVNDBid:JVNDB-2019-006258date:2019-07-17T00:00:00
db:PACKETSTORMid:153547date:2019-07-08T21:05:30
db:CNNVDid:CNNVD-201907-374date:2019-07-08T00:00:00
db:NVDid:CVE-2019-11890date:2019-07-09T13:15:12.163